Skip to main content Accessibility help
×
Hostname: page-component-76fb5796d-45l2p Total loading time: 0 Render date: 2024-04-28T00:07:43.730Z Has data issue: false hasContentIssue false

8 - The combinatorics of cryptographic key establishment

Published online by Cambridge University Press:  16 March 2010

Anthony Hilton
Affiliation:
University of Reading
John Talbot
Affiliation:
University College London
Get access

Summary

Abstract

One of the most important processes involved in securing a cryptographic system is establishing the keys on which the system will rely. In this article we review the significant contribution of combinatorial mathematics to the development of the theory of cryptographic key establishment. We will describe relevant applications, review current research and, where appropriate, identify areas where further research is required.

Introduction

Cryptography provides the core information security services that are necessary to safeguard electronic communications. The sound management of cryptographic keys is the fundamental supporting activity that underpins the secure implementation of cryptography. The purpose of this paper is to demonstrate the significant contribution of combinatorial mathematics to the development of the theory of cryptographic key establishment.

  • Scope: This paper surveys areas of key establishment where combinatorial models or construction techniques have proven of value. Our aim is not to provide a comprehensive survey of the literature, but rather to provide sufficient coverage that most relevant work will be (to use the terminology of Section 7.3.3) at most a “two-hop path” from this review. This paper is not an attempt to survey the vast research on key establishment in general.

  • Detail: The primary aim is to bring these applications of combinatorics to the attention of the mathematical community within a sensible unifying framework. We thus focus on introducing concepts and providing pointers for further study. This paper contains no proofs. Combinatorial modelling typically involves the establishment of bounds and constructions. For illustrative purposes we will tend to focus on constructions in this review.

  • […]

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2007

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×